The impact of vendor customizations on android security, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.623-634, 2013. ,
DOI : 10.1145/2508859.2516728
AT command set for 3GPP User Equipment (UE), pp.17-18, 1999. ,
Taming Mr Hayes: Mitigating signaling based attacks on smartphones, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp.1-12, 2012. ,
DOI : 10.1109/DSN.2012.6263943
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.676.7275
Android Internals and Telephony, Int. J. Emerg. Technol. Adv. Eng, vol.4, pp.51-59, 2014. ,
Android RIL Integration Guide-Huawei, 2014. ,
All Your Droid Are Belong To Us : A Survey of Current Android Attacks, WOOT, 2011. ,
pywinauto -Windows GUI automation using Python -Google Project Hosting, https://code.google.com ,
Android Forensics: Investigation, Analysis and Mobile Security for Google Android, 2011. ,
Learning Android, 2011. ,